iPhone Owners

effowe

Diamond Member
Nov 1, 2004
6,012
18
81
Source

How To Hijack 'Every iPhone In The World'
Andy Greenberg, 07.28.09, 05:40 PM EDT
On Thursday, two researchers plan to reveal an unpatched iPhone bug that could virally infect phones via SMS.

If you receive a text message on your iPhone any time after Thursday afternoon containing only a single square character, Charlie Miller would suggest you turn the device off. Quickly.

That small cipher will likely be your only warning that someone has taken advantage of a bug that Miller and his fellow cybersecurity researcher Collin Mulliner plan to publicize Thursday at the Black Hat cybersecurity conference in Las Vegas. Using a flaw they've found in the iPhone's handling of text messages, the researchers say they'll demonstrate how to send a series of mostly invisible SMS bursts that can give a hacker complete power over any of the smart phone's functions. That includes dialing the phone, visiting Web sites, turning on the device's camera and microphone and, most importantly, sending more text messages to further propagate a mass-gadget hijacking.


"This is serious. The only thing you can do to prevent it is turn off your phone," Miller told Forbes. "Someone could pretty quickly take over every iPhone in the world with this."

Though Miller and Mulliner say they notified Apple ( AAPL - news - people ) about the vulnerability more than a month ago, the company hasn't released a patch, and it didn't respond to Forbes' repeated calls seeking comment.

The iPhone SMS bug is just one of a series that the researchers plan to reveal in their talk. They say they've also found a similar texting bug in Windows Mobile that allows complete remote control of Microsoft ( MSFT - news - people )-based devices. Another pair of SMS bugs in the iPhone and Google's ( GOOG - news - people ) Android phones would purportedly allow a hacker to knock a phone off its wireless network for about 10 seconds with a series of text messages. The trick could be repeated again and again to keep the user offline, Miller says. Though Google has patched the Android flaw, this second iPhone bug also remains unpatched, he adds.

The new round of bugs aren't the first that Miller has dug up in the iPhone's code. In 2007, he became the first to remotely hijack the iPhone using a flaw in its browser. But while that vulnerability gave the attacker a similar power over the phone's functions, it required tricking the user into visiting an infected Web site to invisibly download a piece of malicious software. When Miller alerted Apple in July of that year, the company patched the vulnerability before Miller publicized the bug at the Black Hat conference the following month. ("See: Hacking the iPhone.")

The new attacks, by contrast, can strike a phone without any action on the part of the user and are virtually unpreventable while the phone is powered on, according to Miller and Mulliner's research. And unlike the earlier exploits, Apple has inexplicably left them unpatched, Miller says. "I've given them more time to patch this than I've ever given a company to patch a bug," he says.

The Windows bug he and Mulliner plan to reveal hasn't been patched either, says Miller, though he admits that he and Mulliner discovered the Windows flaw on Monday and hadn't yet alerted Microsoft to its existence.

The attack developed by Miller and Mulliner works by exploiting a missing safeguard in the phones' text messaging software that prevents code in the messages' text from overflowing into other parts of the device's memory where it can run as an executable program. The two researchers plan to demonstrate how a series of 512 SMS messages can exploit the bug, with only one of those messages actually appearing on the phone, showing a small square. (Someone could easily design the attack to show a different message or without any visible messages, Miller cautions.) The entire process of infecting an iPhone and then using the device to infect another phone on the user's contact list would take only a few minutes, Miller says.

The vulnerability of SMS to that sort of attack will likely be a hot topic at this year's Black Hat and Defcon cybersecurity confabs. Two other researchers, Zane Lackey and Luis Miras, say they plan to present other vulnerabilities in major vendors' SMS applications, though they declined to discuss which vendors or the specifics of the vulnerabilities before the companies had issued patches.

Lackey and Miras argue that SMS demands far more attention from the cybersecurity community and device vendors. "Like a lot of mobile phone software, it's been relatively unexplored in the past," Lackey told Forbes. "Only recently has there been proper debugging and development tools available. SMS exemplifies a common trend: once it was a simple technology. Now it's being used in devices far beyond its original purposes, and security is still playing catch up."

The researchers' concerns aren't merely theoretical. Finnish security firm F-Secure says it's found nearly 500 different variants of mobile phone malicious software since 2004, mostly using Bluetooth to hop between phones in close proximity. But in the last 18 months, cybercriminals have begun using text messages to send links to malicious Web sites that infect the phone with malware, says Mikko Hyppönen, an F-Secure researcher.

One seemingly-Chinese variant, known as "Sexy View" and currently targeting the Symbian operating system, is far more threatening than an iPhone attack, given that around 50% of cellphones use Symbian, Hyppönen says. "After years of the security industry wondering why we aren't seeing text message worms, it's starting to happen now," he says.

While many of those ongoing attacks are merely hacker experiments, some have used phones to text premium numbers that generate revenue for cybercriminals. "Mostly it's still about curiosity and fun, but eventually the criminal guys move in," says Hyppönen. "We're probably on the verge of that right now."

As dangerous as his iPhone attack sounds, Miller argues that it's important to expose flaws in SMS software before they can be exploited by more malicious actors. Texting applications' insecurity isn't due to the software's complexity so much as the security community's inattention and the expense of sending thousands of text messages to test a phone's security, Miller says.

"The bad news is that SMS is the perfect attack vector, but the good news is that it's probably possible to build it securely," he says. "As a researcher, I can only show [Apple] the bugs. It's up to them to fix them."

Watch out if you get a text with a single square.
 

effowe

Diamond Member
Nov 1, 2004
6,012
18
81
This flaw was already confirmed and fixed in Android, it exists.
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Meh. I don't doubt that the vulnerability is real, but this strikes me as fear mongering. Such a flaw makes the assumption that the carriers will let obviously malformed SMS messages be passed in rapid succession - if there was such a risk, the carriers would immediately block it.
 

Tegeril

Platinum Member
Apr 2, 2003
2,906
5
81
Originally posted by: ViRGE
Meh. I don't doubt that the vulnerability is real, but this strikes me as fear mongering. Such a flaw makes the assumption that the carriers will let obviously malformed SMS messages be passed in rapid succession - if there was such a risk, the carriers would immediately block it.

This.
 

mmntech

Lifer
Sep 20, 2007
17,501
12
0
Originally posted by: ViRGE
Meh. I don't doubt that the vulnerability is real, but this strikes me as fear mongering. Such a flaw makes the assumption that the carriers will let obviously malformed SMS messages be passed in rapid succession - if there was such a risk, the carriers would immediately block it.

QFT. These stupid e-doomsday stories come out every so often and they're wrong most of the time. It's well into zero hour and my iPhone has yet to become self aware and chase me into the closet.
 

gorcorps

aka Brandon
Jul 18, 2004
30,739
452
126
Originally posted by: mmntech
Originally posted by: ViRGE
Meh. I don't doubt that the vulnerability is real, but this strikes me as fear mongering. Such a flaw makes the assumption that the carriers will let obviously malformed SMS messages be passed in rapid succession - if there was such a risk, the carriers would immediately block it.

QFT. These stupid e-doomsday stories come out every so often and they're wrong most of the time. It's well into zero hour and my iPhone has yet to become self aware and chase me into the closet.

Nevermind the fact that if you DID get infected, it's a very simple and easy matter of restoring your phone. Everything should be backed up through itunes and restoring shouldn't take too long. Even in a worst case scenario you'd have your infected phone clean and restored in an hour.
 

zacharace

Senior member
Sep 3, 2005
450
0
0
Originally posted by: gorcorps
Originally posted by: mmntech
Originally posted by: ViRGE
Meh. I don't doubt that the vulnerability is real, but this strikes me as fear mongering. Such a flaw makes the assumption that the carriers will let obviously malformed SMS messages be passed in rapid succession - if there was such a risk, the carriers would immediately block it.

QFT. These stupid e-doomsday stories come out every so often and they're wrong most of the time. It's well into zero hour and my iPhone has yet to become self aware and chase me into the closet.

Nevermind the fact that if you DID get infected, it's a very simple and easy matter of restoring your phone. Everything should be backed up through itunes and restoring shouldn't take too long. Even in a worst case scenario you'd have your infected phone clean and restored in an hour.

Exactly.
 

bigrash

Lifer
Feb 20, 2001
17,648
28
91
iPhone firmware update 3.0.1 has been released. Fixes sms security vulnerability bug.
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: pastorjay
But what does the update do to a jailbroken phone? Will this one break it?
Yes. You'll have to wait until a new jailbreak is out for this firmware.
 

Parasitic

Diamond Member
Aug 17, 2002
4,000
2
0
Originally posted by: ViRGE
Originally posted by: pastorjay
But what does the update do to a jailbroken phone? Will this one break it?
Yes. You'll have to wait until a new jailbreak is out for this firmware.

You can use the same redsn0w it seems.
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: Parasitic
Originally posted by: ViRGE
Originally posted by: pastorjay
But what does the update do to a jailbroken phone? Will this one break it?
Yes. You'll have to wait until a new jailbreak is out for this firmware.

You can use the same redsn0w it seems.
Indeed; the dev team signed off on it. Apparently you still need to feed Redsn0w the 3.0 firmware for the actual jailbreaking process though.
 

Parasitic

Diamond Member
Aug 17, 2002
4,000
2
0
I spent some time last night updating my 3G to 3.0.1 then jailbreaking it and trying to unlock it. Ultrasn0w was really finicky and kept giving me the No Service error over and over again, but eventually got it worked out.

However, as I was going through resetting apps and stuff, Fring triggered the "Notification" menu in setting. Does this mean that my phone wasn't activated correctly and now push notifications are back? This is still weird as the phone was activated in an AT&T store with an AT&T SIM then I used it with AT&T until ultrasn0w came out.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |